- Instances: Virtual Computing Environments
- Instance Type: Different configurations of memory, storage, CPU, and networking capacity.
- Machine Image: Pre-specified templates for instances with additional software and operating systems.
- Store Volumes: The storage volumes for non-permanent data are deleted when users hibernate, stop, or terminate an instance.
- EBS Volumes: Storage volumes that are persistent for data using the Elastic Block Store (EBS).
- Secure instance log-in using public-key cryptography: AWS saves the public key, and users are responsible for storing the private key in a secured place.
Users can create one on the Amazon EC2 console ‘Create Key Pair’. To get the administrator password for the Windows instance, the user has to specify the name of the key pair that EC2 will use to associate the public key. The critical name contains up to 255 ASCII characters and cannot have trailing or leading spaces. And then, under the ‘File Format’ section, select the format in which the private key will be saved for deploying with OpenSSH, select ‘pem’, and with PuTTY, select ‘ppk’. The private key is automatically downloaded once the user clicks ‘Create Key Pair’. The base file name will be specified as the crucial pair name and file extension determined by the selected format.
Then, the user will be able to log in using RDP. The user must create a key pair for areas to launch an instance in more than one region. - Securareairewall allows users to specify the ports, protocols, and source IP ranges the instance can get. A Firewall controls both inbound and outbound HTTP & HTTPS traffic at the instance level. A user adds rules to a security group to connect to an instance from its IP address with RDP. A securitRegionp must be created for each region to launch models.
- The EC2 console automatically detects the IPV4 address. Most non-static IP users provide the IP address range after choosing the default region, as security groups are very particular. A user prRegion the name and description to the Security Group. From Inbound Rules from Type List: * Select HTTP and then HTTPS and set the source to Anywhere (0.0.0.0/0) * Select RDP.
In the source box, select ‘My IP’ to populate the field automatically with the local computer IPV4 address, or selechoosestom’ and indicate the IPV4 address of the computer or network using the CIDR notation, i.e. insert the suffix/32. - Regions and Availability Zones: Multiple physical locations for resources like the instances and the EBS.
- Elastic IP Address: Static IPV4 address designed for dynamic cloud computing.
- Metadata or Tags: can be created and assigned to Elastic Compute Cloud resources.
- Virtual Private Clouds (VPCs): The virtual networks created that are logically isolated from the other parts of the cloud and help to connect optionally to the user network.
